Cybersecurity is a vital step in any organization, company, or even an individual's home network. Depending on the tasks one is doing online, if there is improper security on the system, then a lot of information/data can be obtained by an unlawful source. A hacker can even get one's password, email account, location, device information, and so much more, and that is why the field of cybersecurity is evermore advancing.
Many different cybersecurity fields are prospering more than ever, and various fields and security techniques are arising with constant technological advances. In the last decade, there have been many prospering advancements within cybersecurity. If I were to choose one, I would most likely say the advancements in cloud technology/computing. As stated on ibm.com, “Cloud computing is on-demand access, via the internet, to computing resources—applications, servers (physical servers and virtual servers), data storage, development tools, networking capabilities, and more—hosted at a remote data center managed by a cloud services provider (or CSP).”.
Many threats are faced when cloud computing services are offered. As stated in ecpi.edu, “Cybersecurity threats are not only increasing but have also become more sophisticated.”. Whoever hosts the cloud-related service usually is highly liable for the services they provide. Therefore if information or data on the servers is leaked, hacked into, or publicly accessible in any way, lawsuits and angry customers can destroy businesses quickly. This is a primary reason companies or businesses that offer cloud services prioritize the security(cybersecurity) around their products.
Specific threats currently being faced within cloud computing include the quick movements towards cloud computing. According to thesslsstore.com, “The growing number of cloud providers with large free service plans drives down costs and encourages even small companies to move all of their data to the cloud. In many cases, this is done without carefully thinking through access policies.”. A specific event that has improved upon this subject can include the COVID19 virus. With more and more people staying home to avoid the COVID illness, companies are forced to move much of their information on cloud services so employees can access the material remotely.
References
Cloud Computing: A Complete Guide. (2020, July 21). IBM. https://www.ibm.com/cloud/learn/cloud-computing
ECPI Univercity. (2020, November 10). New Technology to Improve Cyber Security that You Should Know About. https://www.ecpi.edu/blog/new-technology-to-improve-cyber-security-that-you-should-know-about
Stevens, G. (2020, May 26). Cloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid. Hashed Out by The SSL StoreTM. https://www.thesslstore.com/blog/cloud-security-5-serious-emerging-cloud-computing-threats-to-avoid/